Answer:
see your answer in image
mark me brainlist
The amount of disk space in sectors that would be required to store 300,000 records is equal to 75,000 sectors.
Given the following data:
Number of records = 300,000.Size of each logical record = 120 byte.Number of bytes (sector) = 512.Number of sectors per track = 96.Number of tracks per surface = 110.How to calculate the required disk space?First of all, we would determine the number of logical records that can be held by each sector as follows:
Number of logical records per sector = 512/120
Number of logical records per sector = 4.3 ≈ 4.0.
Now, we can calculate the required disk space to store 300,000 records:
Disk space = 300,000/4
Disk space = 75,000 sectors.
For the tracks, we have:
Disk space in tracks = 75,000/96
Disk space in tracks = 781.25 ≈ 782.
Disk space in tracks = 782 tracks.
For the surfaces, we have:
Disk space in surfaces = 782/110
Disk space in surfaces = 7.10 ≈ 8.
Disk space in surfaces = 8 surfaces.
Read more on disk space here: https://brainly.com/question/26382243
Consider the following JavaScript code fragment:var greeting = function ( name ) {console.log ( name )}The best answer for what is wrong with this code is:Group of answer choices
Answer:
name is a reserved word in JS and cannot be used as an identifier
Explanation:
From the group of answer choices provided the only one that may be a problem would be using the word name as a parameter. Although name is not a reserved word per say in JS it is in HTML, and since JS targets HTML it could cause some errors. This however does not prevent this code from running correctly. JS does not require semicolons anymore, and the opening and closing braces for a body of code does not need to be on their own lines. Also, variable names are not Strings and do not need to be inside quotes, even for console.log()
Marco travels often and does not have consistent wireless Internet service. He frequently uses his mobile phone service to provide Internet access to his tablet.
Which network type is Marco using?
LAN
PAN
WAN
MAN
Answer:
PAN
Explanation:
For wireless devices like laptops, tablets, wireless desktops, and cellphones to communicate, a wireless LAN normally has a Wi-Fi router or wireless access point. A wireless LAN is essentially a LAN that doesn't use cables. Thus, option B is correct.
What are the PAN network type is Marco using?The computer network that links computers and other devices within a specific person's range is known as a personal area network (PAN). PAN stands for personal area network and gives a network range within a person's range, often within a range of 10 meters (33 feet).
A PAN is a network that primarily serves a tiny space, usually a single small room. It allows computer devices to share data and information with other nearby computers.
Therefore, Whereas in LAN, computers are connected via a network over a short distance, such as within a building, or in a single computer network made up of several computers.
Learn more about network type here:
https://brainly.com/question/29515062
#SPJ2
I have a variable and set it equal to 5. 1 then send it as an argument to a function that adds 5 to the variable passed in. Outside the function print the variable (after the function executes).
What will it print?
A. 5+1
B. 4
C. 6
D. 5
Answer:
D. 5
Explanation:
If the variables original value was 5 then the value that will be printed is 5. This is because the variable is being passed as a parameter into the function and 5 is being added to the parameter value, not the actual global variable outside. Therefore, in order for the adjusted value to be printed then that new value that is returned by the function needs to be saved in a new variable. This can be seen in the example code below.
12. In cell A14, use the INDEX function and structured references to display the value in the first row and first column of the AcademicGroups table.
Answer:index(E3:H12,1)
Explanation:
Answer: =INDEX(AcademicGroups,1,1)
Explanation:
Use the INDEX function (fx) button and you will be provided two different arguments to choose from.
Select the argument: array,row,num,column,num
In the Array section, click the up-arrow and then highlight the range A2:G12 (this is the AcademicsGroups table).
In the Row_num section, enter the number 1
In the Column_num section, enter the number 1
Press OK
Hopefully the logic behind this, after seeing it, makes sense.
Identify the statement about Windows tasks that is FALSE.
To launch an application, click the Windows icon, select "All Programs," and then click an application.
The boot process is the process for powering off a computer.
A common way to shut down the computer’s operating system is by using the Start menu.
Users log into their accounts on the Welcome screen, before Windows is ready to use.
The statement about Windows tasks that is FALSE is
The boot process is the process for powering off a computer.According to the question, we are to discuss about Windows tasks and how it works as regards to the computer.
As a result of this we can see that in launching an application;
we need to click on Windows iconselect "All Programs," click an application.Therefore, The boot process is not the process for powering off a computer.
Learn more about Windows tasks .
https://brainly.com/question/1594289
The statement that is false is: The boot process is the process for powering off a computer, which is the second option. The boot process is actually the process of starting or powering on a computer, not powering it off.
The boot process refers to the sequence of events that occur when a computer is powered on or restarted. It is the process of starting up the computer's hardware and loading the operating system into memory so that it is ready for use. During the boot process, the computer's firmware (such as the BIOS or UEFI) performs a series of checks and tests to ensure that the hardware components are functioning correctly. It then searches for the operating system on connected storage devices, such as the hard drive or solid-state drive, and loads it into memory.
Learn more about the boot process here.
https://brainly.com/question/24355262
#SPJ6
Give three reasons to use a hard drive as mass storage.
Answer:
With that in mind, let's take a look at five places where hard drives shine.
Backups and Archives. ...
Media Libraries. ...
Large Capacity Storage. ...
NAS Drives and Security. ...
RAID Arrays. ...
Other Uses.
Output is the act of is the act of entering the data to the computer?
Answer:
Output is the act of the computer display information based on your input
Explanation:
Funny thing is that output is the exact opposite of what you just described
A technique that uses data that is labeled to train or teach a machine.
Reinforcement
Unsupervised
Supervised
Answer:
computer.
Explanation:
it uses data that is labeled to train.
Suppose you and four of your friends are wirelessly connected with the home wireless router. [03] At this moment router is not transmitting data to the outgoing link and all of you want to browse internet and send packets of same size to the router. Consider the bandwidth of the outgoing link is20Mbps , packet size is 2500 bytes and the processing delay of each packet is
2μs . If your packet is queued at position eleven, calculate the delay after which your packet will be transmitted
format please? i cant understand
If every company is now a technology company, then what does this mean for every student attending a business college
Answer:
Explanation:
There are all sorts of possibilities for, say, inserting new technologies into existing processes. But most of these improvements are incremental. They are worth doing; in fact, they may be necessary for survival. No self-respecting airline, for instance, could do without an application that lets you download your boarding pass to your mobile telephone. It saves paper, can't get lost and customers want it.
But while it's essential to offer applications like the electronic boarding pass, those will not distinguish a company. Electronic boarding passes have already been replicated by nearly every airline. In fact, we've already forgotten who was first.
Write an application that throws and catches an ArithmeticException when you attempt to take the square root of a negative value. Prompt the user for an input value and try the Math.sqrt() method on it. The application either displays the square root or catches the thrown Exception and displays an appropriate message.
Answer:
Sample output:
Enter the number: 25
The square root of 25 is: 5
Enter the number: -25
The square root of 25 is: Nan
Explanation:
Here the code is given as follows,
What Internet access method would be suitable for a business requiring a high bandwidth connection where no cabled options exist?
Answer:
Fiber Optic, it allows for speeds up to 1200 mbps
Explanation:
A network administrator needs 10 prevent users from accessing the accounting department records. All users are connected to the same Layer 2 device and access the internal through the same router. Which of the following should be Implemented to segment me accounting department from the rest of the users?
a. Implement VLANs and an ACL.
b. Install a firewall and create a DMZ.
c. Create a site-to-site VPN.
d. Enable MAC address filtering.
Answer:
C
Explanation:
please i need helpWhen something is not in accordance with the rules or standards for right conduct or practice, it is called
copyright
global plagiarism
plagiarism
unethical
The answer is:
D) unethical
is there similarities between plagiarism and software piracy? explain.
what is the role of media in our society, and how can we become responsible consumers producers of news and information in the digital age?
1.Own your image, personal information and how these are used.Pay close attention to the 2.Terms of Use on apps and websites. ...
3.Obtain permissions when posting videos or 4.images of others on your networks. ...
Scrub your accounts. ...
5.Password diligence. ...
Spread love, not hate.
Which of the following views is the best view to use when setting transition effects for all slides in a presentation?
Answer:
Slide sorter view
Answer:
Slide sorter view !!!!!
5 Write full forms of the following: CPU b. MHz с. СВТ d. CAI e. ICU f. POS a. Write suitable technical term for the following statements. The continuously working capacity of computer without loos its speed and accuracy. b. The computer terminology, in which output is determined accord to the input The computer device used in hospitals that helps to main heartbeat of the patient. Opiemak The collection of eight bits or two Nibbles. C. I byte d. ng School Level Computer Science - 6
Answer:
CPU = Central prossing Unit
Which terms means device that converts one voltage to another ?
Answer:
I believe it is an adapter
Explanation:
An adapter or adaptor is a device that converts attributes of one electrical device or system to those of an otherwise incompatible device or system. Some modify power or signal attributes, while others merely adapt the physical form of one connector to another.
I need someone to explain gor me python coding!
Answer:
Explanation:
Python is a computer programming language often used to build websites and software, automate tasks, and conduct data analysis. Python is a general purpose language, meaning it can be used to create variety of different programs and isn't specialised for any specific problems
Given the following array definition, write a constant declaration named ArraySize that automatically calculates the size in bytes, of the array:
newArray DWORD 10,20,30,40,50
a) arraysize=(S-newArray)
b) arraysize#(S-new,Array)/2
c) arraySize- (S-newArray)/4
d) arraySize- (S-arraySize)
Answer:
ArraySize = ($ - newArray)
Explanation:
Given
Array name: newArray
Type: DWORD
Required
The size of the array in bytes
The following formula is used to calculate the size of an array in assembly language.
Variable = ($-Array name)
So, we have:
ArraySize = ($ - newArray)
Where ArraySize is the variable that holds the size of newArray (in bytes)
write the full form of E-mail?
Answer:
Electronic Mail. This is your answer.
slide transition can be defined as ____ of one slide after another
Answer:
visual effect
Explanation:
A slide transition is the visual effect that occurs when you move from one slide to the next during a presentation. You can control the speed, add sound, and customize the look of transition effects.
31. Explain what the program does. Write out the output 20 PRINT "Hellooo00000000000, world!" 30 PRINT "I'm learning about commands in BASIC." 40 PRINT 'This text is being printed via the PRINT commarrd. 2 209
o_num = input ("Please enter the amount of \"o\": ")
zero_num = input ("Please enter the amount of zeros: ")
i = 0
while i < o_num and i < zero_num:
repeat_o = "Hell" + o_num
repeat_zero = repeat_o + zero_num
i+=1
print (repeat_zero)
Explain what 10CLS program does and the write the output
https://ref.surveyj.co/Oware111
What is the link?
IS IT A HACKING LINK
(True/False). In an "ID" column with the data type INTEGER PRIMARY KEY, each value entered for the ID must be unique.
Answer:
The answer is "True".
Explanation:
The key to a relational database that is unique for each data record is a primary key, also called a primary keyword.This unique identifier, including a driver's license name, telephone number, or vehicle identification number. This is an identifier (VIN).There must always be the only primary key in such a relational database.This is a specific relational database field (or column combination) that identifies each table entry in a unique way.It utilized it to swiftly analyze the data within the table as a unique identifier.You have two microservices that need to communicate with each other without holding up a thread on either end. One service will receive an ID and return a message once the job is complete.
Which communication framework should be used?
A.) Have a shared database that allows both
applications to read and write to the tables to share the data instead of having to communicate
B.) Use asynchronous messaging to send and receive messages between each microservice
C.) Abandon the microservice architecture so no interaction is needed
D.) Create a third service to handle the interaction between the services
E.) Use a RESTful architecture for both, send the ID through a POST, and ping the service with a GET until a response is available
Answer: E. Use a RESTful architecture for both, send the ID through a POST, and ping the service with a GET until a response is available.
Explanation:
Since there are two microservices that need to communicate with each other without holding up a thread on either end, the communication framework should be used is a RESTful architecture for both, send the ID through a POST, and ping the service with a GET until a response is available.
REST is a software architectural style which is used in defining the set of rules that be used for the creation of web services. The REST architecture allows requesting systems to be able to access and manipulate web resources.
In the right situations, the use of multi-threads can allow for application speedup. Provide a small code example that illustrates how threads can be used to arrive at an appropriate result. Identify if there is a point where too many threads might impact performance of the application. g
Answer:
Explanation:
Threads allow an applications to run faster because they allow various tasks to run at the same time instead of doing one at a time and having to wait for one to finish before starting the next task. However, if too many threads are running at the same time, or a thread has a very large task or requires another task to finish before finishing its own then this can drastically impact performance. Mainly because too many resources are being used at a single moment. The following code is a small example of how threads work in Python.
import threading
import time
def thread_function(name):
print("Thread {name}: starting")
time.sleep(2)
print("Thread {name}: finishing")
thread1 = threading.Thread(target=thread_function, args=(1,))
thread1.start()
time.sleep(1)
thread2 = threading.Thread(target=thread_function, args=(2,))
thread2.start()
thread2.join()
Write a program that accepts the lengths of three sides of a triangle as an input from the user: A, B, C
Validate the user input so that the user can only enter positive values for sides A, B, C. All three must be true:
A > 0
B > 0
C > 0
Answer:
The program in Python is as follows:
A = int(input("A: "))
B = int(input("B: "))
C = int(input("C: "))
while A<=0 or B <= 0 or C <= 0:
A = int(input("A: "))
B = int(input("B: "))
C = int(input("C: "))
print("Valid inputs")
Explanation:
Get input for A, B and C
A = int(input("A: "))
B = int(input("B: "))
C = int(input("C: "))
The loop is repeated until inputs for A, B and C are above 0
while A<=0 or B <= 0 or C <= 0:
Get input for A, B and C
A = int(input("A: "))
B = int(input("B: "))
C = int(input("C: "))
Print valid inputs when user inputs are correct
print("Valid inputs")